CISOs Share Top 10 Tips for Managing Vendors Learn How Security Veterans Deal with Vendor Hype, Budgets and Relationships WISEGATE COMMUNITY VIEWPOINTS 222303 Ranch Road 620 South #135-165 Austin, Texas 78734 www.wisegateit.com
Introduction Choosing the right IT product is essential for the health of any company. This is particularly so in IT security, where an ever-changing threat and compliance landscape leads to the continuous evolution and need for new products and tools. Finding the right product at the right time is a complex endeavor but fundamentally success will be defined by how well the security practitioner manages the vendors and navigates the marketing hype to find the right solution. Like all security leaders, Wisegate CISO members face challenges selecting the right vendor and find benefits from the ability confer with others to get advice and learn from the experiences and successes of their peers. In this latest report, Wisegate makes available senior CISOs vendor experiences and recommended practices that are typically shared only between Wisegate members available to the broader Information Security community. This report features the latest practitioner tips that cover a critical aspect of their work, Managing the Vendor with advice in three key areas:» Managing the hype The first question to ask Is a new product really needed? Or would better use of existing or upgraded products fill the requirement? When new products are necessary, how do you find the right one? What role does the vendor play in this process? CISOs provide tips on how to find the right product for the job.» Managing the budget This is an often-overlooked area. All CISOs have a budget and all budgets are limited. But if the budget is gone when the need arises, it can lead to problems. Security veterans offer advice on budget management.» Managing the vendor relationship Products and tools are basically bought or licensed just once but the CISO s relationship with the vendor is an ongoing process. CISOs share strategies for getting the most from vendor relationships. Top 10 Tips for Managing Vendors 2
Managing the Hype The issue, said one security veteran from the insurance industry, is to buy a solution, not the hype. The problem becomes how to achieve this and viewpoints ranged from ignoring new vendor phone calls to working more closely with existing suppliers, and concentrating on threat awareness and new product research. Hype often comes from new companies with new solutions they need to make a lot of noise to get heard. One CISO said she simply ignored all cold calls from vendors. I know that's going to sound a little cold, she said, but listen, we re all busy. I m not going to take those cold calls. I actually let my phone ring and if it's important, they'll leave a message." Top CISO Tips» Make sure you need the product in the first place it could be that an update or add-on to an existing product will suffice.» Don t automatically seek the product with all the latest bells and whistles how a product integrates into your existing architecture can be more important.» Find out what you need from research and talking to other IT leaders, and then ask the vendor to confirm your understanding.» Don t be afraid to ask unusual questions the answers are likely to be all the more instructive. Better integration of existing products can be better than more new products A Director of InfoSec from a Fortune 100 company explained that he would prefer to eliminate a few of his existing vendors, and is not really interested in working with new ones. I counted up the different vendors and we had over 40 different security vendors. That makes it difficult to establish any real strategy cohesion and interfacing between the vendors. His plan is to minimize the number of vendors by concentrating on those that are working well. Over time, he said, he s hoping to have a smaller contingent of vendors each doing more. And although he accepts that he may have to sacrifice the best possible point Wisegate Member Viewpoints 3
products in some areas, he hopes that the synergy inherent in better product integration will lead to a better overall solution and architecture. Another security veteran from the defense industry supported this idea that better use of existing products should be tried before looking at new products. Last year, he explained, we looked at our suite of tools and we said, we've got too much overlap here. We're using 30% of the capabilities of this tool, 80% of this and only 5% of this tool. Subsequent requirements mapping against capabilities allowed him to get rid of two of the tools, noticeably reducing costs and complexity. Make better use of the vendor relationships you already have A CISO from the health care industry articulated what many considered a common mistake: when a new trend is spotted and a solution sought, many companies go straight to the outside market looking for the newest vendors with the latest products. That s a mistake, he suggests, because the company s existing vendors and products are maturing all the time with new updates to solve the latest problems. Hopefully, he adds, I can go into my legacy tools and find that my existing vendors have updates or add-ons that will address the new issues. Only if this fails, he says, will he look at new vendors but even then (echoing the views of others) the secret is not necessarily to look for the absolute best possible point solution, but to find one that integrates into his existing architecture. What I don t want, he explained, is a bunch of disparate tools that don't integrate with each other and cause my cost-ofadministration to go through the roof or to have so many people on board that we start having miscommunications between what the tools are trying to tell us. Consult others in your network There comes a point where better use of existing resources won t solve the problem and a new vendor is needed. But somewhat reluctantly, the vendor is the last person approached. Internal resources tend to be the first port of call. One CISO is lucky enough to have an internal vendor management team and that s where he starts. A senior security manager who works for a global electronics manufacturer pointed out that his security team does all the monitoring, setting policies, defining requirements, while IT has to make it all work. So he consults it s teamwork, he says. I'll give them a couple vendors maybe, or types of tools I d like and I let them decide which one they can manage the best. If I can get a buy-in from them, then I know it s going to be a successful project. Top 10 Tips for Managing Vendors 4
One CISO works in higher education, and doesn t have a team for consultative support. Instead, he said, we go and talk to other schools in our local area. When he says local area, he means Texas and New Mexico. If we find that one or two or maybe even three vendors are popular with a lot of schools, then those are the ones that we start looking at. But if everybody has different vendors, then that makes our research a little harder and we actually will make a determination as to who we're going to meet. Stay up-to-date on trends and technologies In the final analysis, there must be some research but the vendor is often the last person approached. A senior security practitioner said, I still wrestle with what silver bullets are out there that I don't know about so I try to grab reports that provide roundups on the cool vendors. SC Magazine does a great job of comparing vendors so I try to stay on top of that. The competitive reports for specific capabilities help make sure that I m using the right product, and SC Magazine does a great job of benchmarking as well. I m big on research, said another CISO. I do lots of independent research before I even talk to a vendor, he said. I want to know what their product does before they try to tell me what it does. This allows me to ask more intelligent questions, and see through the hype. Just one CISO working in the government sector bucked the trend and took the phone call from the vendor right at the beginning but this was his primary way of doing the research. I let them describe the product to me briefly and if it's something that interests me, I will take the call. I even do a webinar on occasion just to keep up with some of the trends. I do read magazines and reports as well but sometimes seeing it on the screen actually makes a difference. Ask vendors the tough questions to get the right answers Finally, the vendor might be asked to the table but it s not yet to sign a contract. I ask them two questions, said one CISO: What is your cost model and who are your competitors? The cost question is purely practical. I want to know if it s sold by seat or enterprise license or one-time cost because it s going to color how I think about implementing it. If it s by seat, then, I may think, OK, I might put this out for directors and above. If enterprise is the default, then it will fit into my architecture differently. The competitor question is more esoteric. I want to know if they re aware of their competitors and are willing to compare strengths and weaknesses because it may save me time in my own research. But if I do research and find they weren t being upfront with me, it doesn t bode well for an ongoing relationship. Wisegate Member Viewpoints 5
Another CISO from a large industrial manufacturing company takes disruptive questioning even further. It s like when you go to a restaurant and ask, What s the least popular dish? I take a similar approach with vendors. When are you not good? What do you do worse than your competitor? If you ve done your research with Gartner or SC Magazine you can gauge the honesty of the vendor s reply. And that in turn will help you judge whether any relationship will work on the personal level rather than just the technology level. Managing the Budget Handling a security budget is a tricky business. In most other areas, conventional wisdom says that you should always use 100% of your available funds anything less might persuade management to think you don t need so much next year. But if you get caught short in a security emergency with no budget, going cap-in-hand to the board does nothing for your credibility. Top CISO Tips» Avoid overspending to build credibility and fund those unexpected emergencies that inevitably arise.» Be upfront with vendors when budget is a problem they may be able to offer a creative solution in exchange for a long-term deal. Question the use-it-or-lose-it standard thinking One CISO was quite forthright. The practice that I've adopted is to avoid spending my whole security budget, she explained. When I follow this practice, the executives realize that I ll only spend the money that I need to accomplish reducing the risk and affording compliance for all of the requirements. She adds, Of course, if I use it, I use it but if not that ends up serving me well in the long term. The result, she says, is that if an emergency comes up that's not covered by my budget and I have to go in to the board and ask for an exception to that budget spending, then they re going to trust that I really need it because I m not just out buying the latest and greatest gadget. Top 10 Tips for Managing Vendors 6
Put the budget ball in the vendor s court One security veteran suggested putting the ball in the vendor s court. Be honest with them, he suggested. Let them know your budget. But also let them know they re in for the long run if you can reach agreement. Managing the Vendor Relationship Once a product is purchased, the relationship with the vendor changes effective management skills become key to success. Hold them accountable to what they promised, said one CISO. But that being said, she added, and be respectful. She gave an example in which she asked the vendor to help her ensure that a GRC implementation was successful. If the vendor steps up, be an honest reference for them. It leads to a great working relationship if the vendor knows he can call on you having gone through the trenches and can truly speak from the heart." Top CISO Tips» Demand what you pay for, and say thank you when you get it.» Work on continuing the vendor relationship, but stay in charge, control and own it. Demand the best, get what you re promised Another of the security veterans explained how to be strong, but fair in more detail. "One vendor was providing really bad support so I went to the managing director and said, 'Hey, I don't want this guy any more. He's not giving us what we paid for.' Well, they found us someone else, and the new guy is much, much better. So I said, 'Anything that needs touching, I only want this guy to touch it,' (it was actually to tune up our SIEM). And that's the only guy we'll accept now." But, he added, the converse also applies. "This guy was good," he explained, "so I phoned and emailed his managing director, 'This guy's really good I think you have a winner here.' Wisegate Member Viewpoints 7
You have to confront them when necessary, but give them the kudos when earned I really believe in that." The flipside must also apply. A good working relationship is two ways. "I tell them, 'Hey, if you're not getting the support from my team or the IT team if they're not answering emails or they're not coming to conference calls let me know so I can address it at my end.' It s two ways." Vendor accountability is always important and should be demanded. "You need that good working relationship," said another senior security manager. But then you have to be honest and you have to hold the vendor to the agreed statement of work (SOW). "We always get a SOW," he said, "and I hold the vendor to it. At the end of a project I want a report that provides all the answers and doesn't ask any questions. I think it is important to demand that." The best benefits are mutual benefits If you can get that good working relationship, it can benefit both sides. "I like to establish long term relationships with my vendors," commented a CISO working for state government. "The one I use now I've had for seven years." Over that length of time mutual trust can develop. "This vendor," he said, "is not necessarily the most technical vendor around; as a VAR he's not strong in the 'V' part." But, and this is the point, the CISO can go to his VAR and say, "Look, here's the problem we got. Can you solve it? And if you can't solve it yourself, can you find me someone who can?" The value here is that the VAR is likely to have a better understanding of the market than the practitioner, and can provide huge savings in both time and money. "Without this involvement, I can work out what I need, but I have to go to an RFP and when I have to publish, review, evaluate and everything else that comes with an RFP, I'm looking at three to six months before I even get into contract negotiations." It's different when you can delegate some of that effort. "I have a VAR that can actually assume some of that contract responsibility because I already have a contract with him." He gave an example. "The last time I had to negotiate a contract with Dell, back in 1999, it took me two years. Now, if I want to buy a product from Dell I use my VAR. He accepts Dell's terms, but he also accepts mine because we already have a contract he becomes the intermediary." That's not to say he takes over support responsibility for the original manufacturer. "Sometimes I go to the VAR, sometimes I go to the manufacturer. But most of the time I use Top 10 Tips for Managing Vendors 8
the VAR as a purchasing vehicle and a contract negotiation or expediting vehicle, while all of our communication will go straight to the manufacturer." Be reasonable with vendor gift policies There s one other area that comes under the general concept of vendor relationships, and that s vendor gifts. Are they purchasing incentives? Providing a subtle way for the vendor to control the relationship? Or are they a simple thank you that oils the wheels of business? Wisegate asked its members two basic questions on their attitude towards accepting gifts and favors from vendors. What s your company s policy about accepting gifts or favors from vendors? Wisegate Member Viewpoints 9
What is your opinion about strict policies against accepting anything from vendors? The general feeling seems to be that vendor gifts are okay, within limits; that they should be neither fully accepted nor completely rejected. Most companies set a dollar value on acceptable gifts and it s worth noting that apart from potential tax implications, some countries such as the UK have strict bribery laws where an expensive gift could be interpreted as a bribe, creating problems for both giver and receiver. In our opinion, commented one security practitioner, an outright prohibition of vendor gifts is not reasonable. Our policy sets a dollar value limit for individual gifts, events and favors. And this works well for us. Another pointed out that the US Government and many large corporations allow a reasonable limit on gifts, usually in the $50-$100 range. This lets employees say no to the outrageous stuff, while not getting into an occasional lunch/dinner situation where they have to pay out of pocket or get manager approval after the fact. Generally, said another, our rule is that if the gift has a value of over $25 then it must be refused or given to a staff member in a way that removes any bias. He gave an example. If we were to get tickets to a sports game, we would either refuse them outright or we would draw names out of a hat and select who would receive them that way. Top 10 Tips for Managing Vendors 10
In Closing... Managing the relationship with vendors is a tricky, but essential, business. The first job is to find the right vendor and this means getting beyond the hype to find the right solution. Managing budgets to afford the product is not really seen as a problem: CISOs either have the budget or they don t have the budget. It s not so much a problem as a fact of life. But while buying a product is a limited event, the ongoing relationship with the vendor is where the true value is found, and is almost always where the greatest effort needs to be spent. Being part of the Wisegate expert network keeps senior IT practitioners abreast of evolving strategies and informed on which approaches their peers find effective. In-depth discussions on the challenges and strategies that can be used to forge productive relationships with vendors and other related issues continue online at www.wisegateit.com. Wisegate is an IT expert network and information service that provides senior-level IT professionals with high quality research and intelligence from the best source available the collective knowledge of IT leaders from across the industry. Through live roundtable discussions, detailed product reviews, online Q&A and polls, and timely research reports, Wisegate offers a practical and unbiased information source built on the real-world experience of veteran IT professionals. No analyst theories or vendor bias to cloud the information, just clear and straightforward insight from experienced IT leaders. Would you like to join us? Go to wisegateit.com/request-invite/ to learn more and to submit your request for membership. 2303 Ranch Road 620 South #135-165 Austin, Texas 78734 PHONE 512.763.0555 EMAIL info@wisegateit.com www.wisegateit.com 2013 Wisegate. All rights reserved. Wisegate Member Viewpoints 11